Results 11 to 20 of about 152,186 (174)

Trajectory privacy protection scheme based on differential privacy

open access: yesTongxin xuebao, 2021
To solve the problem that the current sampling mechanism and data obfuscation method may raise insufficient data availability and privacy protection, a trajectory privacy protection scheme based on differential privacy was proposed.A new efficient ...
Si CHEN   +3 more
doaj   +3 more sources

Privacy risks in trajectory data publishing: reconstructing private trajectories from continuous properties [PDF]

open access: yes, 2008
Location and time information about individuals can be captured through GPS devices, GSM phones, RFID tag readers, and by other similar means. Such data can be pre-processed to obtain trajectories which are sequences of spatio-temporal data points ...
Kaplan, Emre   +5 more
core   +3 more sources

Privacy-preserving trajectory similarity computation method

open access: yesTongxin xuebao, 2022
To tackle privacy concerns on user information leakage in trajectory outsourcing services, a privacy-preserving trajectory similarity computation (pTSC) method was proposed.A trajectory outsourcing service provider was enabled to store encrypted ...
Haining YU   +4 more
doaj   +3 more sources

Real-world trajectory sharing with local differential privacy [PDF]

open access: yesProceedings of the VLDB Endowment, 2021
Sharing trajectories is beneficial for many real-world applications, such as managing disease spread through contact tracing and tailoring public services to a population's travel patterns. However, public concern over privacy and data protection has limited the extent to which this data is shared.
Cunningham, Teddy   +3 more
openaire   +3 more sources

Preserving Trajectory Privacy in Driving Data Release

open access: yesICASSP 2022 - 2022 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), 2022
Real-time data transmissions from a vehicle enhance road safety and traffic efficiency by aggregating data in a central server for data analytics. When drivers share their instantaneous vehicular information for a service provider to perform a legitimate task, a curious service provider may also infer private information it has not been authorized for.
Xu, Yi   +3 more
openaire   +2 more sources

Risk-Aware Individual Trajectory Data Publishing With Differential Privacy

open access: yesIEEE Access, 2021
Large-scale spatiotemporal data mining has created valuable insights into managing key areas of society and the economy. It has encouraged data owners to release/publish trajectory datasets. However, the ill-informed publication of such valuable datasets
Jianzhe Zhao   +4 more
doaj   +1 more source

Discovering private trajectories using background information [PDF]

open access: yes, 2009
Trajectories are spatio-temporal traces of moving objects which contain valuable information to be harvested by spatio-temporal data mining techniques.
Kaplan, Emre   +5 more
core   +2 more sources

Differential privacy protection method based on published trajectory cross-correlation constraint.

open access: yesPLoS ONE, 2020
Aiming to solve the problem of low data utilization and privacy protection, a personalized differential privacy protection method based on cross-correlation constraints is proposed.
Zhaowei Hu, Jing Yang
doaj   +1 more source

Multi-camera trajectory forecasting : pedestrian trajectory prediction in a network of cameras [PDF]

open access: yes, 2020
We introduce the task of multi-camera trajectory forecasting (MCTF), where the future trajectory of an object is predicted in a network of cameras. Prior works consider forecasting trajectories in a single camera view.
Guha, Tanaya   +3 more
core   +2 more sources

Privacy Preservation in the Publication of Trajectories [PDF]

open access: yesThe Ninth International Conference on Mobile Data Management (mdm 2008), 2008
We study the problem of protecting privacy in the publication of location sequences. Consider a database of trajectories, corresponding to movements of people, captured by their transactions when they use credit or RFID debit cards. We show that, if such trajectories are published exactly (by only hiding the identities of persons that followed them ...
Mamoulis, N, Terrovitis, M
openaire   +2 more sources

Home - About - Disclaimer - Privacy